Online Identity Theft Protection



             


Sunday, December 30, 2007

Identity Theft Scams Exposed

none
Identity Theft Scams Exposed, Part I by James H. Dimmitt

FACT: It takes 14 months, on average, before an Identity theft victim realizes their identity has been stolen.

Therefore its important that you be aware of scam artists and identity thieves who will use any means possible to get your personal information.

One scam that has been circling the internet and unfortunately working is what I like to call the Your Account Needs To Be Verified scam.

This scam begins with you being contacted through your e-mail account by someone claiming to be from your credit card company, your internet service provider, Paypal, eBay, or any other popular internet company.

The scammer sends a message stating that your account information needs to be verified because their files were hacked into, their database crashed or they believe that someone has tried to steal your account information.

Sounds pretty serious doesnt it ? Just the type of e-mail no one likes to receive. And just the type of e-mail that usually gets your attention and makes you respond.

They will ask you to confirm your name, address, and telephone number. Then your account number, user name and password. Sometimes they will ask for your bank account information claiming it is just another part of the verification process. And because you think its from the actual company, you provide all this information easily.

In cases of impersonating your credit card company they will ask you the same information that you provided when you applied for their credit card. Your name, your social security number, your mothers maiden name, etc.

The e-mails you receive can look very convincing, maybe even using that companys logo. The senders address can also look very convincing and may have what appears to be an official company e-mail address such as one of your creditors or AOL.

The reality is its not your credit card company, AOL, Earthlink, PayPal, or Ebay contacting you. Even if the senders address contains part of the company name be very cautious.

Chances are that you are being contacted by a scam artist or identity thief who wants to verify , or more truthfully get, your personal information so that they can then turn around and use this information fraudulently against you.

Once you verify your information with them, the identity thief takes that information to open up new accounts in your name. And remember ...It takes 14 months, on average, before an Identity theft victim realizes their identity has been stolen.

TIP: NEVER give personal information to a company, such as AOL, eBay, or your credit card company that already has it. If you are suspicious about being contacted, contact the company yourself before giving out or verifying any personal information - especially through e-mail.

James Dimmitt is author of "Identity Theft - How To Avoid Becoming the Next Victim!", visit http://tinyrul.com/bc45 for more information

Labels: , , , , , ,

Thursday, December 27, 2007

WILL THE REAL YOU PLEASE STAND UP? How To Prevent Identity Theft

WILL THE REAL YOU PLEASE STAND UP?
How To Prevent Identity Theft

Every day, nearly 1,400 Americans are victims of identity theft. It can take anywhere from two to four years to straighten out the nightmare, and the average victim will invest approximately 175 hours and over $800 of their own money trying to get their situation resolved. Here are five steps you can take to protect yourself, safeguard your identity, and ensure that your credit remains sound.

1.Guard your Social Security number. If you have the number printed on your checks, cross it off manually and reorder new checks without it. If you have your SSN as your driver?s license number, request a new one with a different number.

2.Check your bank and credit card statements every month for unusual activity. You only have sixty days to report identity theft, or you become liable for the damages yourself.

3.Mail your bills from the Post Office or a public mailbox to deter thieves from stealing your outgoing checks and erasing the ink to use them later.

4.Shred any receipts and documents containing account numbers, policy numbers, or other personal information that could aid a thief in taking your identity. Trash diggers are known to target dumpsters for personal financial information.

5.Opt out of pre-approved credit card offers. You can opt out of receiving these annoying and potentially dangerous offers simply by calling toll-free at 1-888-5-OPT-OUT (1-888-567-8688). You will be mailed a form asking for your Social Security Number, however, in this case, it?s safe to give it to them so they can remove you from their database.

Don't let someone else live a life of leisure at your expense. Taking these simple steps to protect your identity will pay off for you long term by saving you countless hours of time and aggravation trying to restore your credit and your good name.

Monica Ricci has been an organizing specialist since 1999, and her motivational presentations teach effective organizing and simplifying techniques for home and work. She also offers free email tips and ideas on how to make life simpler and more organized. Her topics include clutter control, paper management, time management, organizing space and procrastination.Contact Monica at 770-569-2642 or Monica@CatalystOrganizing.com.

Labels: , , , , ,

Wednesday, December 26, 2007

Easy Ways To Protect Yourself From Identity Theft

It's no surprise that thousands of Americans are victimized by identity theft each year. What are we actually doing to protect ourselves from identity theft?

Many of us don't think about it and some may not even know what it is. The fact is it happens. Identity thieves victimize thousands of people each day. Causing havoc and destruction to all it seeks.

Last year over 9,000,000 people suffered devastation caused by identity theft; averaging over 45 billion dollars yearly.

As modern technology advance and become more sophisticated; identity thieves advance and become more sophisticated. By taking advantage of expensive, yet adequate technologies and software, these introducers are able to become undetectable.

By the time the average person realizes they have become a victim of identity theft; it is too late. By this point, the victim financial stability and credit ranking may be impacted significantly.

The truth is that the number of victims is growing everyday and there is no absolute solution; however, there are simple steps that can be taken to limit your chances of becoming a victim.

* The most important step in guarding yourself from identity theft is to keep your confidential information confidential. Social Security Numbers, Credit Card Numbers, Bank Account Information or any other confidential information should never be given to unknown companies or unidentified individuals.

Never tell anyone your personal information over the phone or send it through email, nor fax. Most legitimate companies will not request this information from you via phone or any other unprotected source.

If you are an online consumer, always make sure that you have a secure connection with the online eCommerce site, before submitting your credit card information and other identifiable information. Irresponsible credit card usage is the most common way to fall victim of identity theft.

* Monitoring your credit report monthly is a great step in stopping introducers in their tracks. By keeping close tabs on your credit activity you may be able to prevent major damages to your credit and financial wealth.

* Important documents containing your confidential information should be kept in safe, unexposed places. Even in the privacy of your own home, documents with such content should not be exposed. You may opt to use P.O. Box or Private Mail Boxes to send private documents.

By following these steps you can lower your risk of becoming an identity theft victim. Being informed is the most valuable protection against identity theft.


Discover useful advice and information about low interest credit cards. What to look out for, and how to find the best low interest deals.  http://www.lowinterestcreditcardsinfo.com/

 

Labels: , , , , ,

Friday, December 21, 2007

What is Identity Theft ?

Does Identity Theft actually happen? How is it possible for someone to steal your identity? Identity theft occurs when someone uses your personal information such as your name, credit card number or other identifying information, without your permission to commit fraud or other crimes.

Identity theft is a serious crime. People whose identities have been stolen can spend months or years - and their hard-earned money - cleaning up the mess thieves have made of their good name and credit record. In the meantime, victims may lose job opportunities, be refused loans, housing or cars, or even get arrested for crimes they didn't commit.

How it works:

In recent years identity theft has been on the increase. By trickery, by stealing information from rubbish bins or office bins, or by using publicly available information, a crook obtains personal information about youfor example, date of birth and mother's maiden name. The result could be that the thief is able to obtain credit cards, take out loans, issue counterfeit cheques or credit cards and go on a spending spree in your name. In effect, they become you for the sole purpose of committing fraud or theft.

This type of crime also can go undetected for many months, if not years, because bills and other documents often are sent to fake addresses, not to your house. You may only become aware of the situation after unpaid and overdue bills begin to accumulate and your credit record has been downgraded. You may even be denied a loan or credit card, an apartment, a job or other opportunities because an identity thief ruined your credit rating.

Best defense:

To avoid credit card fraud protect all your credit card numbers, account passwords or other personal information. Be suspicious of unsolicited offers that seem too good to be true, because they could be fraudulent attempts to get your bank account numbers or other personal information.

If credit cards or IDs of any kind are missing, immediately notify the issuers. Pay attention to your bank and credit card statements, and quickly report a suspected fraud.

If Your Personal Information Has Been Lost or Stolen:

If you've lost personal information or identification, or if it has been stolen from you, taking certain steps quickly can minimize the potential for identity theft. Close accounts, like credit cards and bank accounts, immediately. When you open new accounts, place passwords on them. Avoid using your mother's maiden name, your birth date or your phone number.


You may freely reprint this article provided the author's biography remains intact:

John Mussi is the founder of Direct Online Loans who help UK homeowners find the best available loans via http://www.directonlineloans.co.uk website.

Labels: , , , , ,

Wednesday, December 19, 2007

Identity Theft OR Will The REAL Me Please Stand Up!

There is a new thief on the block. An identity thief and YOU are at risk!
There is a new thief on the block. An identity thief and YOU are at risk!

Identity Theft is the fastest growing crime today and is effecting approximately 900,000 NEW victims each year!

Everyday transactions such as writing a check, using your cell phone, making a charge purchase, applying for a credit card, mailing your tax returns, even simply placing your outgoing mail in your mail box may put you at risk.

Shopping Online (e-commerce) has enabled consumers to purchase almost any product online, from clothing to groceries, vehicles to home loans and anywhere in between. All with the click of the mouse!

These and other transactions require you to share personal information-credit and bank account numbers, your social security number, birth date, your income, name, address and telephone number.

The identity theft takes some piece of your information and then co-opts (shares) the information while pretending to be you and uses it to commit fraud or theft. Such as using your personal information to obtain credit, merchandise, services or even criminal action in your name.

You, in return, are left with your good name and credit ruined and with the complicated and time consuming task of regaining your identity and restoring your credit.

Can identity theft be completely preventedNo, but there are steps/ways you can take to minimize your risk by managing your personal information better.

Ways An Identity Thief Uses Your Information:

The identity thief calls your credit card issuer, posing as you, gives a change of address for your credit card account. Then the identity thief uses your card information to run up charges on your account.

Since your statement (and the merchandise) is going to a new address, you don't realize right away there is a problem.

Using your name, birth date and social security number, the identity thief can open new credit card accounts in your name, never pay the bills and the delinquent account is reported in your name and becomes part of your credit report.

Identity thieves have also been know to open a bank account in your name, write bad checks on the account and leave you facing the consequences.

Another area of identity theft is using counterfeit checks and/or debit cards and steal the money from your bank account.

Still another area of identity theft is establishing cellular phone service in your name. The identity thief can even buy vehicles by using your name and taking out a vehicle loan.

Steps To Help You Decrease Your Risk Of Identity Theft:

1. Protect your Social Security Number.

Don't carry your Social Security card with you or in your wallet. Leave your drivers license, social security and home telephone numbers off your personal checks.

2. Shop Online at Secure Web Sites.

Always make sure you are dealing with a secure web site. Look for https:// displayed in your web address bar located near the top of your screen. The "s" after "http" stands for "secure". https://

3. Destroy information and papers you throw away.

Shred (crosscut shredders are best) bank information, credit card information, offers for credit and payments made with receipts given.

4. Know your credit accounts billing cycles.

In case your bills are late coming in, you can call the company and request a duplicate copy. This will help you see right away if there is a problem on your account.

5. Check your credit report.

Once a year check your credit report with the three major credit reporting agencies. Don't overlook the "Inquiries" section of the report. This will give you an overview of creditors, accounts and inquiries made on your report.

Even though you can't totally prevent identity theft from occurring, following these few steps and tips will help you lower your risk. When the time (credit report) comes.... The Real You IS Standing Up!

Livvie Matthews, Internet Business Specialist, Consultant and Author helps people interested in creating information products, niche marketing and building relationships while building their business! Visit http://www.simplebizpublications.com and Market Your Goldmine! Simple Biz Ezine subscribe mailto:subscribe@simplebizpublications.com Receive a Free e-mail course.

Labels: , , ,

Tuesday, December 18, 2007

Identity Theft and Your Online Job Search

While identity theft is nothing new, the Web has opened up whole new world of opportunity for identity thieves.According the FBI, identity theft is the top online fraud. The U.S. Federal Trade Commission says that identity theft is its number one source

While identity theft is nothing new, the Web has opened up whole new world of opportunity for identity thieves.

According the FBI, identity theft is the top online fraud. The U.S. Federal Trade Commission says that identity theft is it's number one source of consumer complaints - 42 percent of all complaints, in 2001.

The thief will use your personal information to open credit card accounts, cell phone accounts, open bank accounts in your name and write bad checks-leaving the victim with the bills and ruined credit ratings. Identity thieves may pose as representatives of banks, Internet service providers and even government agencies to get you to reveal your Social Security number, mother's maiden name, financial account numbers and identifying information.

In a recent article, MSNBC reported the case of a man who fell victim to a fraudulent job listing that was posted at Monster.com. According to the article: "It was just the job lead Jim needed: a marketing manager position with Arthur Gallagher, a leading international insurance broker. And only days after Jim responded to the job posting on Monster.com, a human resources director sent along a promising e-mail. We're interested in you, the note said. The salary is negotiable, the clients big. In fact, the clients are so valuable and sensitive that you'll have to submit to a background check as part of the interview process. Eager for work, Jim complied- and sent off just about every key to his digital identity, including his age, height, weight, Social Security number, bank account numbers, even his mother's maiden name."

Jim spent the day canceling his credit cards, checking his balances and contacting the credit bureaus, but he's concerned that his information is now "out there".

There are warning signs that can tip you off to fraudulent job listings. While these items don't necessarily mean that the listing is a scam, they are indications that you should do further checking.

Incorrect grammar and spelling errors Phone or fax number area codes don't match the address given Unrealistic salary

Online job databases are not the only places that identity thieves cruise for personal information. In recent indictments across the U.S., individuals have been charged with obtaining and using personal information through various ways. In Miami, two individuals were indicted for illegally tapping the computer networks of restaurants using the cover of a dummy corporation. A clerical worker at the New York State Insurance Fund pilfered office files and used stolen identities (of people across the country as well as fellow office workers) to obtain goods and services. A phlebotomist at Kaiser Permanente admitted to using the personal information of patients and employees in order to open credit card accounts in various names.

Recently, an FTC investigation into a work-at-home scheme spawned an incredible "scam-within-a-scam" when a man pretending to be an FTC employee emailed hundreds of the scam's victims. He requested personal information stating that it was to be used as evidence in the case.

While it's impossible to completely eliminate the chances of becoming a victim, you can minimize the risk by putting the following to practice:

If a would-be employer asks you for any personal information you should ask them for their contact information and then separately look up the company's information and contact them to verify that they actually exist. While it's not unusual for an employer to ask for certain work-related information (like your work history and former employers), it is not appropriate for them to ask for personal information (like a social security number) unless you are actually being hired (and you've checked them out to make sure they're legitimate). Even then, you should never be asked for financial information such as a credit card number. On online resumes, never include your social security number and keep even your work history brief. Check your credit card statements often. Believe it or not, many people never even check them! Be sure to follow up with creditors if your bill doesn't arrive on time. A missing credit card bill may mean that an identity thief has changed your billing address to cover their tracks. Order your credit report from one of the major credit bureaus each year and verify that everything is correct.

What to do if you've been a victim of identity theft:

The FTC maintains Consumer Sentinels Identity Theft Data Clearinghouse, the nations repository for identity theft complaints. The FTC established the Identity Theft Toll-Free Hotline, 1.877.IDTHEFT (1.877.438.4338) and the ID Theft Website (www.consumer.gov/idtheft) to give identity theft victims a central place to report their problems and receive helpful information.

The Internet Fraud Complaint Center (IFCC) is a partnership between the Federal Bureau of Investigation (FBI) and the National White Collar Crime Center (NW3C). You can use their online system to file a complaint.
Sharon Davis is the owner of 2Work-At-Home.Com and the Editor of the site's monthly ezine, America's Home. In her spare time she reminisces about what it was like to have spare time. To subscribe to her free ezine, Click Here

Sharon Davis, Work-At-Home expert, author and consultant, helps people to achieve their goal of working at home, telecommuting or starting a home business. http://www.2Work-At-Home.com List of other articles of interest: http://www.2work-at-home.com/freecontent.shtml Subscribe to her free ezine: http://www.2work-at-home.com/subscribe.shtml

Labels: , , , , , ,

Friday, December 14, 2007

Identity Theft Exploding: Heres How you can Avoid Becoming a Victim - Plus, Tips if you do Become a Victim

Americans are more concerned about identity theft than unemployment or corporate fraud, according to a survey of 2,000 people conducted by Star Systems.

Nine out of ten Americans demand new federal legislation, while two-thirds say the financial services industry needs to do a better job of verifying the identity of customers who open bank accounts (66 percent) and credit card accounts (72 percent).

Some 5.6 percent of respondents reported being victims of identity theft, which translates to 12 million people. When debit and credit card fraud and identity theft were combined, close to 15.9 percent of consumers say they have been the victim of one of these crimes. (Source: Star Systems, 2003)

For most of us, using your debit or credit card to make a purchase has become an every day aspect of life. Many of us do it every day and feel safe in doing so.

But it is far from safe. People with your debit or credit card information may make purchases with your card information over the telephone, via the Internet, or at a local retail store.

As we moved to a cashless system of transactions by debit or credit card, a relatively simple crime niche has grown identity theft and fraud.

Some law enforcement authorities are not pursuing the crime in a coordinated and cooperative fashion. Thus, a situation has grown that affords the people who perpetrate such acts of theft and fraud, act with a degree of confidents that they will not get caught.

What can you do to reduce your chances of becoming a victim of identity theft or fraud?

Here is a list of actions that you can take to avoid becoming a victim of identity crimes.

1. Never throw receipts or statements away that have personal information on them. The trash is the greatest repository of information for the identity thief. Even better, shred everything that has identifying information on it (transaction receipts, etc.).

2. Pay to have an unlisted telephone number in your local telephone directory.

3. Take as much identification off of your personal checks and drivers license as possible. Thus, no home addresses, phone numbers, or social security numbers on personal checks. Last only your last name and first initial rather than your full name. You want a retail clerk to check your ID when you are cashing a check.

Most states now provide a photo ID on all new automobile drivers licenses issued. If you do not have one, conceder getting your licenses renewed now to get a photo ID for identification purposes. Do not put your social security number on your drivers license.

4. Check your bank accounts for suspicious activity everyday, this can be done online via the Internet.

5. Have your middle initial removed from all public documentation if possible. Middle initials help identity thieves narrow down their searches for victims.

6. If someone calls you asking for your personal information on the telephone do not provide any personal information to anyone over the phone.

7. Dont leave your mail out overnight. If you will be away from home for any period of time: have your home mail delivery stopped. If possible, secure a locked mail box at your local post office or a retail store mail box service for your home mail delivery.

If you go on vacation, have your mail and newspaper delivery stopped and arrange to have your yard maintained. Include the post office, newspaper service, and your friends or neighbors to insure that your home looks as if it is occupied while you are gone.

For a checklist for your home security while you are away see ProtectionConnect.com/homesecurity www.ProtectionConnect.com/sitemap. www checklist.html or html#home.

8. Write Check ID on the back of your debit or credit cards next to your signature. In that way, when a retail store checks your signature on your card, they will verify that the card is being used by the proper individual.

9. Be aware of people standing too close to you and shoulder surfing you while you conduct your ATM transactions.

If you do become a victim of an identity crime do the following:

1. Demand to file a police report no matter how unwilling the law enforcement office may be. Make sure to get a copy or at least the report number.

2. In the case of card fraud, make sure to cancel your card and report it as stolen to your credit card company as soon as you find out.

Immediately, fill out affidavits with the appropriate financial institution denying that you were the one who made the relevant purchases. In most cases, the banks will respond with up to a 30-day process that requires the businesses that accepted the fraudulent transactions to repay the banks.

3. Report the fraud to the three major credit bureaus:

~ TransUnion Post Office Box 2000 Chester, PA 19022

~ Equifax, Equifax Equifax Credit Information Services, Inc Post Office Box 740241 Atlanta, GA 30374 1.888.766.0008

~ Experian Consumer Information Post Office Box 1909 Orange, CA 92865

4. The U.S. Secret Service handles fraud cases that cross state borders. If you know that your case applies, contact their local office to make them aware of your case. If it is part of a broader fraud case, you may be contacted by an agent.

5. You can also fill out a complaint form with the Federal Trade Commission, although this is strictly used to track national identity theft statistics.

Steven Presar is a recognized small business technology coach, Internet publisher, author, speaker, and trainer. He provides personal, home, and computer security solutions at
www.ProtectionConnect.com. He provides business software reviews at www.OnlineSoftwareGuide.com. In addition, he publishes articles for starting and running a small business at www.abcResults.com. Be sure to sign-up for the SOHO newsletter.

Labels: , , , , , ,

Wednesday, December 12, 2007

Catching Spyware to Avoid Identity Theft

 Arming your computer against spyware is an important move to make to protect your personal security and private information. Statistics on the number of identity theft victims continue to rise as do the number of computers being infected with spyware. Some numbers have shown nine out of ten computers are affected by spyware, many on computer whose users are unaware of the infection. Identity theft and spyware are connected in that spyware has become a common method for intruders to gather your personal information and bank numbers so they can commit identity theft.

Spyware installs itself or comes installed with freeware and shareware programs. Once embedded in your computer it tracks your internet and software usages, records sent and received email and instant messages and logs keystrokes to identify passwords and credit card numbers. The information is sent out to advertisers or other intruders who will use it to bombard your computer with ads or at worst steal and use your accounts.

You will often lose complete control over your computer once spyware has been installed. The spyware can cause browser crashes and other unauthorized changes in your computer. The unwanted pop up ads that result from spyware can cause the computer to work slower and possible destroy some programs from being able to run. Spyware specific tools are needed to rid of and protect against spyware because normal anti-virus software is not designed to detect spyware, as it is unique from viruses. Spyware programs should also be able to detect adware, a similar application that runs on your computer by sending a constant stream of pop ups. Adware can be dangerous to the proper functioning of your computer.

Mitch Johnson is a successful freelance author that writes regularly for http://www.spyware-removal-made-easy.com/, a site that focuses exclusively on spyware removal software, as well as tips on how to prevent spyware from popping up on your computer. This site articles on has spyware guard, http://www.spyware-removal-made-easy.com/spyware_guard.htmas well as spyware scanner, http://www.spyware-removal-made-easy.com/spyware_scanner.htm

Labels: , , , , ,

Friday, December 7, 2007

Identity Theft - Don't blame The Internet

 Identity theft also known as ID theft, identity fraud and ID fraud describes a type of fraud where a criminal adopts someone elses identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500% each year and, according to Which Magazine, 25% of the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being estimated at $52.6 billion.

With figures like this, its no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet users minds.

Its easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureaus research the main methods by which criminals gain access to information used for identity theft fraud are as below:

Lost or stolen wallet, chequebook or credit card. 28.8%

Accessed as part of a transaction. 12.9%*

Accessed by friend, acquaintance or relative. 11.4%

Don't know, refused, no answer. 11.1%

Information accessed by corrupt employee. 8.7%

Stolen paper mail or fraudulent change of address. 8.0%

Obtained some other way. 7.4%

Computer spyware. 5.2%

Information stolen from garbage. 2.6%

Computer viruses and/or hackers. 2.2%

Emails sent by criminals posing as legitimate business. 1.7%

* 12.9% due to transactions 10.4% offline transactions, 2.5% online transactions.

In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6% of the information used to carry out identity theft fraud was obtained from computers.

Of this more than half was obtained by the use of spyware, viruses or hacking the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to real time monitoring.

Of course, thats not to say that you shouldnt exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.
Hamish Hayward
Don't become a victim of identity theft. Get the facts.
http://www.id-theft-info.com

 

Labels: , , , , ,

Wednesday, December 5, 2007

Identity Theft - Is The Internet A Major Factor?

 Identity theft also known as ID theft, identity fraud and ID fraud describes a type of fraud where a criminal adopts someone elses identity in order to profit illegally. It is one of the fastest growing forms of fraud in many developed countries.

In the UK identity theft is increasing at the rate of 500ach year and, according to Which Magazine, 25f the population have either suffered from identity theft or know someone who has.

In the USA, a report issued by the Better Business Bureau revealed that, in 2004, over 9 million Americans became victims of identity theft with the total sum defrauded being $52.6 billion.

With figures like this, its no surprise that there is a certain amount of concern regarding computer and internet security. After all, the internet is basically a mechanism for exchanging information and the possibility that some of the information exchanged may be more than intended is never far from many internet users minds.

Its easy to imagine criminal masterminds worldwide using the internet to hack into computers in order to gain access to information with which to advance their devilishly cunning schemes. However, as revealed in the report, the facts of the matter are a little more down to earth and the internet, far from making you more at risk to identity theft, can help to significantly cut your losses if you do fall victim this form of fraud.

According to the Better Business Bureaus research the main methods by which criminals gain access to information used for identity theft fraud are as below:

Lost or stolen wallet, chequebook or credit card. 28.8
Accessed as part of a transaction. 12.9

Accessed by friend, acquaintance or relative. 11.4
Don't know, refused, no answer. 11.1
Information accessed by corrupt employee. 8.7
Stolen paper mail or fraudulent change of address. 8.0
Obtained some other way. 7.4
Computer spyware. 5.2
Information stolen from garbage. 2.6
Computer viruses and/or hackers. 2.2
Emails sent by criminals posing as legitimate business. 1.7
* 12.9ue to transactions 10.4ffline transactions, 2.5nline transactions.

In total, when the instances where information was accessed during transactions are subdivided into online and offline transactions, only 11.6f the information used to carry out identity theft fraud was obtained from computers.

Of this more than half was obtained by the use of spyware, viruses or hacking the risk of which can be greatly reduced by installing the appropriate protection software and ensuring that this is kept up to date.

Not only did the survey reveal that the internet was not a major source of illegally obtained personal information, but it was also found that those fraud victims who checked their financial records using the internet, ATM machines or other electronic methods suffered financial losses which were, on average, 8 times lower than those of victims who used traditional paper statements to monitor their accounts. This very significant reduction was attributed to the rapid discovery of the fraud due to real time monitoring.

Of course, thats not to say that you shouldnt exercise caution when using the internet or take care to protect the personal information which you may have stored on your PC. However, as long as you install suitable virus, firewall and spyware protection, and keep this continually updated the internet can should be more of a help than a hindrance when it comes to avoiding identity fraud.

Hamish Hayward - Don't become a victim of ID theft. Get the facts. http://www.id-theft-info.com

Labels: , , , , ,

How you can Help Prevent Identity Theft

How can I prevent Identity theft from happening to me? Never leave your receipt or slip in the ATM or gas pump. Pay attention to your habits, lock up or organize and file your bills, and bank statements. Shred them using a cross shredder before throwing them away.

In a recent article in MSN Money their research showed that 32% of people said they had been a victim of identity fraud by a friend or family, and 13% were victimized by a co-worker. Beware! These people know your patterns and habits.

Some steps you can take to avoid becoming a victim of Identity theft are:

Get a copy of your credit report from all three credit bureaus. (FREE as of 9/1/05!)

Experian, PO Box 2002, Allen TX 75013 www.experian.com 888-397-3742
Equifax, PO Box 740241, Atlanta, GA 30348 www.equifax.com 800-685-1111
Trans Union, PO Box 4000, Chester, PA 19016 www.transunion.com 866-887-2673

Opt out of mailing lists by contacting the credit bureaus above.
Opt out by reading the privacy notice that comes with your credit card and following the instructions.
Call the national Do Not Call Registry at 1-888-382-1222 or visit www.donotcall.gov be sure to call from the number you want to register
Do not carry your Social Security Card in your wallet
Do not print your Social security number on your checks
Do not get your social security number printed on your drivers license
Do not carry your Medicade card with you, Medicade #s are your Social security number
Delete any emails from Nigeria, or lottery or prize notifications before opening
Stop credit card offers 888-5-OPT-OUT
Remove your name from national mailing lists by visiting www.the-dma.org or write to:
Mail Preference Service
PO Box 643
Carmel, NY 10512

Install firewall and virus protection software on your computer
Password protect your computer and private personal files
Format your hard drive or physically destroy when disposing of your old computer
When you order new checks, get your first initial printed on them instead of your first name
Use a cross shredder to shred your bills and bank statements or any junk mail
Bring your mail to the post office or secure mail box rather than leaving it in a rural box.
Use only one designated credit card for online purchases
Be sure all online purchases are made through a secure server notice the lock icon and how the URL address changes from http to https. The S means SECURE.
Do not carry your PIN # in your wallet
Do not use your date of birth as a password or PIN.
Do not give out personal or financial information over the phone.
Grind up or shred back up CDs you are throwing away.
Check your online banking account at least 3 times a week and change your password often.

If you feel you have been a victim of identity fraud, contact the Department of Justice, consumer protection division. They offer mediation with identity theft; they also have a hot line for consumers that is available 8-5 Monday Friday. They maintain a database of written complaints that goes back to 1998. They offer seminars to school, seniors or your group.

Be aware that 40 million crooks obtained credit card numbers this past year, Be Suspicious. Also be aware that most identify theft is not reported, especially when it involves family members, so the statistics are off. These statistics show that consumers lost $5 billion last year when in actuality it is closer to $50 billion. There have been an estimated 9.9 million victims in America.

Michelle Dunn has over 17 years experience in credit and debt collection.
She has written 5 books in her Collecting Money Series. For more information on Michelles services or to order any of her books please email her at michelle@michelledunn.com or visit www.michelledunn.com& www.credit-and-collections.com



Secure your Privacy from Spyware and other Adware programs. Mitch JohnsonKnown by several different names, from spyware to malware or internet parasites, surveillance applications are installed on your system to monitor your internet activities and reveal your surfing patterns and purchasing habits. Spyware also extracts email addresses, hijacks browsers and records credit card numbers, bank accounts and password information.

The information gathered by a spyware application is sent back to the intruder who typically uses it to bombard you with pop up and email advertisements. More serious consequences occur when credit and bank information is obtained by spyware and used for identity theft or credit card fraud. Spyware also compromises the fast and efficient functioning of your computer as it builds up and uses the systems resources. Computer crashes occur with extreme infections which can lead to malfunctions in your registry keys and memory.

To avoid spyware and adware and protect your privacy users must be cautious when surfing the internet. Beware of freeware and shareware programs as they usually install spyware as well, without the users knowledge. Install and regularly use a good spyware scan and removal tool. An effective anti-spyware program will detect and remove all possible infected files.

The scanner should perform a deep system scan in order to catch files infected that usually go unnoticed.
Most spyware scanners have a removal feature as well but for those that do not a list of detected spyware files is still complied at the end of the scan. This list given by any spyware tool tells the details of that particular spyware as well as its location on your computer. If there is not removal feature on your program you can try manually deleting them.

Mitch Johnson is a successful freelance author that writes regularly for http://www.1st-in-remove-spyware.com/, a site that focuses primarily on spyware detection software, as well as tips on how to avoid spyware from popping up on your computer. His articles have also been featured on related spyware sites such as,
http://www.best-in-spyware-detection.com/as well as http://www.best-sypware-removal-reviews.com/

Labels: , , , , ,

Preventing Online Identity Theft

Identity theft is one of the most common criminal acts in society today. Criminals will use your personal information such as banking accounts and passwords, to pretend that they are you. They may take out credit cards in your name, mortgages, or even worse. The internet has opened up a whole world of possibilities for these criminals, and the threat is very real. There are things that you can do to help prevent such a crime. It costs very little to protect your information, and it is money well spent.

The following is a list of tips to help you protect yourself from identity theft. Search around for the best price on these services, to make the most out of your money.

1. Monitor your credit report often. The U.S. government suggests that you check your credit report yearly to prevent identity theft. Every person is entitled to one free credit report a year though www.annualcreditreport.com. I would suggest checking your credit report several times a year for the highest level of protection. Look for unexplained charges or activity on your report. You can often sign up for a credit monitoring service for a few dollars a month. They will watch your credit report for you, for signs of foul play. For a good deal, look for a credit monitoring service, you should be able to get a good discount on various services online.

2. Bank with a credible bank. Stick with a financial institution that is well known. No only will they offer you the highest level of protection, but they often have the best interest rate deals around. Get your credit cards through reputable companies as well. Be weary of small companies, with little credentials.

3. Dont give out your personal information to anyone. A good financial situation will never ask for your login information or passwords. Be weary of anyone that asks you for your mothers maiden name. This is one of the most common items used for identity theft. Use your birthplace or pets name whenever possible. It will be harder to steal your information.

Protecting yourself online doesnt have to cost an arm and a leg. By looking for deals and promotions at coupon websites, you can save a great deal on the services that you need. I would recommend using the free credit report option, coupled with a credit monitoring service for the best protection. The earlier you catch criminal activity, the less damage they are able to do.

Melanie Breeze, avid online shopper and user of http://www.CouponChief.comis always shopping around for the best deals. You can find credit company coupons including more discounts available for web services at CouponChief, all in one location. Finding a coupon before any online purchase helps you get that extra discount!


Simple Search Engine Optimizationsteve loszewskiSearch Engine Optimization Made Simple
Very few topics have inspired as many tangents, as much false information . . . incurred as much abuse as search engine optimization. With the few shreds of information search engines reveal about their actual methodologies, optimizers struggle to get that extra edge over the competition, armed with esoteric theories of keyword density, precise meta-tag length, optimal internal linking, and just about any other detail that a search engine might happen to factor into its rankings. Before you find yourself scrambling to create ten more content-less pages to avert that worst than death curse of decreased PageRank, try to take a look at the big picture. Barring design factors that may not be search engine friendly, a strong foundation based on four factors will give your site good success. These factors are the holy grail of optimization:

1. Get relevant links to your site anchored to keyword rich text.
2. Write focused body text that targets specific keyphrases or that is focused on a specific topic (This occurs naturally when someone is communicating useful information. This can be a problem because a lot of businesses dont have anything useful to say. Be detailed. Be helpful. This can naturally accomplish what automatic text generators try to accomplish through keyword density and keyword proximity calculations).
3. Write concise titles focused on useful keyphrases.
4. Be patient. You may not be using the best strategies, but youre using strategies that work over time. Continue to get links and create more content.

Find the Words
Before you can write good, keyphrase-focused body text or titles, you need to find the phrases users search. For good keyword suggestion tools, search Google with (surprise, surprise) keyword suggestion tool. Digitalpoint.com has an excellent tool that compares Wordtracker and Overture keyword results. Judge from the search volume how competitive each word is (not even close to the best method, but itll have to due). Be specific. Pick words with large search volume and search with geographic terms if you serve only a specific area. From the list of keyphrases, start thinking about the topics youll want to target. Find a few phrases for each page in your site. Remember to focus on phrases and not separate words make sure these phrases appear in your body text.

Titles
HTML titles go between the title tags in your sites code. Write short titles that use one or two keyphrases. Dont use the name of your company unless you are trying to brand the name. Include location if you target certain areas, and make sure your pages repeat this location information in the text. Your body text should be written to fit the phrases in your title.

Body Text and Navigation
Be specific about what you are talking about. In your navigation dont use generic linking text like home or about us. Use specific phrases. Instead of home use the name or category of your main service/product, and make it obvious from the context that this is your main page. Instead of about us use a phrase like A (main product/service) Company. This communicates more information to the user and includes a keyphrase. Where appropriate, make the same type of substitutions in the body text. Use variations of nouns and verbs, including plurals and different conjugations.
If you can, use the heading tags (h1, h2, etc.) to write text titles. Try to communicate as much as you can in text search engines dont see the text in images, or fancy media like Flash. Alt tags are useful, but search engines dont put as much weight on them as visible text. In general, whatever has a greater chance to be seen by the user is going to get greater weight from the search engines (Except for those things produced by JavaScript, or Flash, or written into an image use common sense).

Build Links
It is remarkably easy to get your site indexed by the search engines just submit to some of the many free directories. To find some of these directories search for free directory list in Google. Be careful to read submission guidelines, and be very careful about what you submit to large directories like DMOZ. Generally, titles should not be a list of keywords. Most directories only want your homepage and the official title (somewhat ambiguous term) of your site with a short description. Descriptions should be factual, and they should be written in complete sentences or meaningful phrases. Some optimization companies will rip you off by charging you money to submit your site to the major search engines this is a waste of time. Start building links, and the search engines will find your site naturally, submitting makes no difference in your rankings.
It is important to get links from sites that are related to yours. Write webmasters requesting a link, find niche sites that offer free submissions, write articles for sites that allow you to put down a signature link, or post comments in forums that allow you to put down your signature.
If you exchange links, be careful who you trade with. Get listed wherever you want without fear of penalty from the search engines, but be careful who you link to. Your site can get penalized for linking into bad neighborhoods spamming the search engines.

It Never Ends
Expand your site and continue to tell people about its content. Its an ongoing process. The older your site gets, the more credibility it can gain with the search engines. Keep your content fresh. Check the search engines to see what they have indexed (search site:www.domain.com). Be patient and keep up with search engine changes.

Steve Loszewski contracts out to Pure Visibility (http://www.purevisibility.com) for search engine marketing services.


Associated Myths in MLMJoseph ThenThe MLM business is so popular among people that some of them are totally ignorant about the fact that it takes hard work and days of sweat to make it big. There are number of myths associated with MLM business. Whether a person is a fresher or an expert, anyone hardly knows about MLM business in depth. Some of the associated myths are:

Online MLM business makes lots of money in just one month

This is the most destructive myth among the lot of many such myths. People think it is the fastest method of getting rich. They pool in some money from here and there and invest them in MLM business. After a series of failures they realize that it's not just the money that is lost but time too. Only the established and experienced people earn about $ 1000 in a month or so. All those who start from the grass root level can never earn this much initially.

Companies lure by giving attractive ads

When some companies big promises it simply means that if you follow them you get ruined or the company gets ruined in a couple of years or so. Imagine you had made some residual income and lost it after a short span of time. How would you feel? A genuine business should multiply its own money and not divide it with time. Try to stay away from such lucrative but destructive ads. Don't believe them unless you find them out yourself. It can be fatal.

The more sales you make the more you generate money for yourself

The fact is totally opposite of what people think and say. Too many people come together and help each other but in the end make too little sales in MLM business. Distributors make money initially, sometimes quickly, by recruiting family members and friends etc to form a big downline. They get hefty commissions in return, that is how they make quick money. Gradually, all of them start losing all their money; simply because they couldn't mange to sell the product and all there effort and money go in vain. The bottom line is that you make money by enhancing your downline and not by making sales. Sales are the rare possibilities in MLM business.

You are the first member of the company's family tree and you construct the organization downwards

People jump and grab the opportunity thinking that they are going to be the director or the head of all the people they bring in to form a downline. They carry this attitude to work too and suffer all the more. Only with the passage of time do they realize that they are at the lowest level and there is no one actually superior or inferior to them. Ultimately they find out that there is actually no one in the organization. They begin and end at the same level. The factor or the attitude that works in MLM business is that everybody is at the same level. All of them should help each other and contribute their share of hard work to build the company.

In building a home based online MLM business, initially your work would demand you to bring in few but efficient people and provide them all the motivation and aid so that they make sales. Once the team is established and a helping attitude takes firm hold in the team, half the battle is won. To further build your organization just put in your heart and soul to it, nurture it, and let it grow naturally. Then there's no looking back. You would definitely make a mark.

Joseph Then operates Sign ups company that helps thousands of online MLM marketers increase their downline for the past 5 years. They have served over 3,000 customers. You can visit the site at http://www.trafficforless.com


Getting started with RSSJorge GonzalezRSS is probably the biggest and latest buzzword among the techies, just after blogs. But what is RSS anyway and how can you start taking advantage of it?

RSS is a format to provide headlines and summaries of information in a simple and standardized way.
Think of it as a distributable "What's New" for websites.

RSS is great for users because it saves users from having to repeatedly visit favorite websites to check for new content or be notified of updates via email.
It can give a glimpse of a site's latest concrete contents (no design) in a second.

RSS is also great for site owners because:
- The summaries of their content can be republished all over the web, which gets new links and visits to the site.
- They get more returning visitors, since users can suscribe to the feed to keep up with the site's updates.
- More profits: RSS feeds can contain ads, such as Google Adsense.

RSS feeds can be used for:
- Blogs entries
- Forum entries
- Articles
- News
- Events
- Latest products / discounts / specials
- Music (podcasting)

There are several ways to read an RSS feed:
- Using your browser or even notepad --since it's just an XML file (formatted flat text).
- Using a standalone desktop aggregator --such as FeedDemon, SharpReader, RssReader, and others.
- Using your e-mail client --NewsGator Email Edition plugs into Outlook Express, Eudora, Entourage, Apple Mail, or other POP3 e-mail clients and lets you receive RSS feeds right in your e-mail window. The same company's Outlook Edition integrates RSS with Microsoft Outlook. And Mozilla's Thunderbird e-mail client comes with RSS-reading capabilities built in.
- Using your mobile device --using a service such as FeedBeep, NewsGator Mobile Edition, Yahoo Mobile, or Elfinland.

To create an RSS for your own site, there is the option to create it by hand, or using a software like FeedForAll, or an online service like RSS creator (http://www.webreference.com/cgi-bin/perl/makerss.pl).

Finally, to search for established RSS feeds you can use our very own RSS search engine (http://www.yourfeeds.com), and to quickly submit your RSS feed to several directories, you can use our RSS submit tool (http://www.yourfeeds.com/Submit-RSS.aspx).

Jorge Gonzalez is one of the creators of the YourFeeds.com RSS search engine: http://www.yourfeeds.com


Benefits of Integrating Online Chat Software with CRMBruce ZhangCustomer Relationship Management (CRM) is a strategy and processes used to learn more about customers' needs and behaviors in order to develop stronger relationships with them. CRM applications are traditionally developed as client-server software. The proliferation of the Internet and the Web has fueled the rapid growth of Web-based CRM or online CRM applications. Web CRM systems are widely deployed for Web based call center, contact management, trouble ticket, personal information manager and scheduling. As more and more corporations use chat software to provide quality customer support, many CRM vendors have built chat functionality into new generation of Web-based CRM systems.

The first generation of text-based online chat software was developed years before the World Wide Web (WWW) gained its popularity. The new generation of Web-based chat software is much more user-friendly and is powered with audio and video chat.


There're many benefits to integrate chat software into CRM systems.

1. Many customers have experience in using chat software

New technology is often challenged by user acceptance. Fortunately, online chat has been widely accepted by average Internet users. It is estimated that tens of million of Internet users login to online chat rooms regularly. In free adult chat rooms or free teen chat rooms people talk about anything under the sun - love, pets, music and games.


2. One customer service representative is able to support multiple customers at the same time.

It is common to wait 30 minutes or even more before a customer can talk to a support representative. With chat software, customers have a better chance of instant access to a service representative. One support team member may be able to chat with a few customers at the same time.


3. Chat software can automatically log a support chat session

Call center software is capable of recording support conversations. However, it requires extra cost to convert audio recordings to digital information that a computer can understand and extract valuable information from. Chat software, on the other hand, can be easily configured to automatically log a support chat session.

Bruce Zhang writes about Internet technology and online culture. chatjungle.com is a good place to experience free adult chat rooms http://www.chatjungle.com/adult-chat.htmlor free teen chat rooms http://www.chatjungle.com/teen-chat.html
 

Labels: , , , , ,

How to Prevent Online Identity Theft

 

Identity theft rates one of the fastest growing crimes in mAmerica today and the Internet can make it even easier for some criminals to take your good name and drag it through the mud.

Identity theft involves criminals stealing your personal information such as credit card numbers, social security numbers and other information, usually to buy things on credit or to empty out your bank accounts.

Through your financial liability with your credit cards may be limited to $50 to $500, it can take years for you to clean up the mess online identity thieves leave behind.

As with any crime, an ounce of prevention may just cause the would-be identity thieves to leave you alone and move on to an easier target.

The following tips can help you avoid having your identity stolen.

1. Never give out your social security number, online or otherwise. No company you buy things from needs your social security number.

If you do business on the web, obtain a a Federal Tax ID number to use instead of your social security number.

Once criminals have your social security number, along with your birth date and address, they have virtually everything they need to start wreaking havoc in your life.

2. Use a good anti-virus program. One of the ways criminals get your credit card numbers, passwords and other sensitive information is through "Trojan horse" viruses that log your keystrokes and transmit information to the evil doers.

The "Bad Trans" virus that has caused so much havoc is just such a virus.

3. Always use a "secure" server when transmitting credit card information over the web and know something about the company before handing over your information.

You can feel pretty confident that you are using a secure server if a little lock displays in the status bar on the bottom of your web browser.

4. A popular new way to pay for goods and services online is to "use your checking account just like a credit card".

Be extremely cautious about paying this way through the web. By giving a company your checking account numbers you give away much of the information necessary to empty your bank account!

5. Never give out information such as your birthday, marital status, education level or other personal information.

This additional information makes it extremely easy for criminals to make themselves appear legitimate when they pose as you. Websites should ultimately only require you to provide your name, email and billing information for a purchase.

You should avoid any site requiring more information than that.

These criminals prey on people's ignorance and you can usually defeat them simply by making it too hard for them to get your information.

If you do find yourself a victim, immediately contact police and get legal help. Do not wait because you feel embarrassed or "stupid" over what happened.

Waiting only lets the trail grow cold and limits how much law enforcement can do to help you.

(c) Jim Edwards - All Rights reserved
http://www.thenetreporter.com

Jim Edwards is a syndicated newspaper columnist and the co-author of an amazing new ebook that will teach you how to use fr^e articles to quickly drive thousands of targeted visitors to your website or affiliate links...

Simple "Traffic Machine" brings Thousands of NEW visitors to your website for weeks, even months... without spending a dime on advertising!http://www.turnwordsintotraffic.com

Labels: , , , , ,

Monday, December 3, 2007

Identity Theft: Safeguarding Can't Hurt

Will we ever get a break? Not right now .In San Diego, police arrested a postal worker for stealing mail and trading it to identity thieves to support his drug habit.

Another arrest involved the hacking of wireless carrier T-MobileUSA's network. According to Fox News, the attacker gained access to a database of 16 million customers including the personel information of the Secret Service agent investigating the break in.

Then there's Choicepoint. When last we left the information giant, criminals broke into their 19 billion records database. Choicepoint now acknowledges previous attacks that date back to the year 2000.

The number of identity theft victims as well as the methods of getting personal information continue to increase sharply. Yet while no 100% guarantees exist online or off, safeguarding can't hurt and one of the best ways for fighting identity theft exist in your own home.

Check your trash.

Going thru your garbage has turned into an exact science and a major goldmine for the identity thieves. The Department of Justice refers to this as "dumpster diving" Check everything you throw away then check it again.

Mark any information including financial statements, driver's license, address and especially your social security # "Sensitive" then shred it. I recommend a crosscut shredder. Throw it away in different garbage cans on different days.

Shred junk mail credit card offers and get taken off the major credit agencies' marketing lists.

If you're not doing it already, get into the habit of taking your mail particulary any bill payments directly to the Post Office. Identity thieves also target mailboxes. They frequently stake out the area and wait for the optimum time. Getting a locked mailbox doesn't hurt either.

Use anti spyware, a firewall and antivirus programs on your computer system. If performing a transaction online make sure the company provides a secure server. They should tell you but if not look for the yellow lock at the bottom of your screen.

Guard your plastic. Examine your credit card statements and request a copy of your credit report. Agencies will send you one free copy per year. If you request more than one, you get charged a fee anywhere from 9 to 20 dollars depending on the credit bureau.

Handle this with care. Eventhough you're doing the right thing in trying to protect yourself, too many inquiries are frowned upon by these agencies and could impact your credit negatively. Joining a credit monitoring company can remove that obstacle.

One caveat.You should exercise vigilance in protecting your credit cards but it's not the total solution that some experts claim. The Federal Trade Commission estimates that 60% of all identity theft cases do NOT involve any existing accounts. Guard your plastic but make guarding your Social security number the top priority.

These methods of protection take on a special significance due to the identity of the criminals. According to the Better Business Bureau's 2005 Fraud Survey Report, family freinds and neighbors account for half of all identity thieves. You don't want to turn someone you know and love over to the authorities so do your best to eliminate the temptation.

Again, no 100% guarantees exists. You make transactions at the restaurant, corner store, gas station and a host of other places. We all need to deal in this world so there's always a risk factor. Stay vigilant on the things you control and the chances of identity theft can decrease.

Because at all costs you want to avoid what many victims rank as the worst part of identity theft. The nightmare of recovery.

Daryl Campbell is a writer and home business owner.Banks say you should check your credit once a year. No problem right? Except it leaves identity thieves the other 364 days to steal it. Get the professionals on your side to watch your back 24/7. How? Go now to => http://digbig.com/4dwsx

Linneker@comcast.net

Labels: , , , ,

Saturday, December 1, 2007

Identity Theft: They Got Him

His hard earned money? Gone. Creditors on his back everyday. The cops knocking on his door. His family strained to the breaking point. He didn't do anything wrong but my business partner's life got turned upside down a few years back. He became a victim of what is now the fastest growing crime in the world. Identity theft.

According to the Federal Trade Commission, since 1999 over 27 million people in the US alone became victims of this epidemic 10 million more last year. Harris Interactive, a marketing research company, reports that between 2002 and 2003 more roughly 19,178 people per day fell victim.

Your identity can be stolen in many ways. For my partner, the thief gained access to his social security number and address then applied for a series of loans in his name. When the bills came due, guess who the creditors and law enforcement held accountable?

He and his family felt the full impact. Identity theft can cripple and even destroy a person's life. The time loss trying to recover your identity as well as the out of pocket expense U.S.Treasury Secretary John Snow calls identity theft "the greatest threat to consumers and far more insidious and harmful to our national welfare than many people realize."

The internet doesn't make it any better with its almost limitless access to information but a great deal of identity theft still comes from the offline world. Wherever it comes from the goal stays the same. To get your personal information and steal what belongs to you for as long as possible.

In many cases, this can lead to the victim filing for bankruptcy or worse. As reported by the Orlando Sentinel, one man whose identity got stolen recently spent 54 days in jail before authorities realized their mistake.

Yet even when the thief finally gets caught, victims find out all too often the worse part still lies ahead. The recovery of their identity. For my partner, that meant never ending battles with the same credit bureaus that previously gave him good ratings.

They destroyed his credit almost overnight even though he did everything they told him to get it restored. The agencies refused to clear his record and instead, started sharing his information with each other. His mortgage rates went thru the roof. He paid more for everything but still got declined. With all of this came the burden and fear of him not knowing if he would ever recover his identity.

Six years later he finally did. He started working with a company that within 90 days restored his credit. His mortgage rate dropped and he went back to paying full price for everything like the rest of us.

And like my partner, all of us risk becoming victims. In San Antonio Texas, television station KENS 5 spoke with a man convicted of identity theft who warned "Don't take for granted what you have because anybody could take it away - I mean at the snap of a finger."

He would know. The ways of stealing an identity have turned this crime from nuisance to worldwide crisis.

Daryl Campbell is CEO of Campbell Marketing, L.L.C. His website, mini-sites, and articles help people to grow and protect their internet marketing business. Go to winthemarket.com now.

** Attn Ezine editors / Site owners **

Feel free to reprint this article in its entirety in your ezine or on your site so long as you leave all links in place, do not modify the content and include our resource box as listed above.

fourpreps@comcast.net

Labels: , , ,